The SCEAS System
Navigation Menu

Journals in DBLP

Journal of Computer Security
1992, volume: 1, number: 3-4

  1. J. C. Wray
    An Analysis of Covert Timing Channels. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1992, v:1, n:3-4, pp:219-232 [Journal]
  2. W.-M. Hu
    Reducing Timing Channels with Fuzzy Time. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1992, v:1, n:3-4, pp:233-254 [Journal]
  3. James W. Gray III
    Toward a Mathematical Foundation for Information. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1992, v:1, n:3-4, pp:255-294 [Journal]
  4. Joseph Tardo, K. Alagappan
    SPX: Global Authentication Using Public Key Certificates. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1992, v:1, n:3-4, pp:295-316 [Journal]
  5. Paul F. Syverson
    Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1992, v:1, n:3-4, pp:317-334 [Journal]
  6. Paul Ammann, Ravi S. Sandhu
    The Extended Schematic Protection Model [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1992, v:1, n:3-4, pp:335-384 [Journal]
  7. J. Jacob
    Basic Theorems About Security. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1992, v:1, n:3-4, pp:385-412 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002